OpenSSL Heartbleed bug: CVE-2014-0160

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.

OpenSSL Heartbleed bug: CVE-2014-0160

L1 Bithead


Just wondering if any Palo Alto versions are affected by this bug in OpenSSL?



Not applicable

Yes, it looks to have just went live. Any reason as to why it was originally pulled and then re-released?

Initially there was an issue, the newly added signature was not visible until the user logout and login again into the GUI.


I have applied it but when we test our websites using Test your server for Heartbleed (CVE-2014-0160) it reports our sites as vulnerable.

So this update can be installed during work hours and not cause any issues to the operation of the PA

Is that a question? If it is the answer is yes.

rgreens, mine is doing the same thing still. Is the update not working?

rgreens, Are you seeing the vulnerability signature firing in the Threat Log?  When we try either that website or the Python script that is going around against our websites, I do not see anything in the Threat log after we have applied 429-2164.

Nothing in the threat log either.

L4 Transporter

I'm using to test various sites both behind a pair of PA firewalls and internal sites where traffic is monitored by a PA4020 in tap mode only, and I can't get the threat alert to fire off when I test sites. Is anyone else having trouble verifying the threat rule is working?

For reference I'm using from here:

Python Heartbleed (CVE-2014-0160) Proof of Concept

I was not able to get the signature to fire neither....

L4 Transporter

Has anyone actually gotten hit by  heartbleed? If so how does it show in the PA etc.

L2 Linker

Is this it?

Threat/Content Name   OpenSSL TLS Heartbeat Information Disclosure Vulnerability

IPS vulnerability signature ID 36416 ("OpenSSL TLS Heartbeat Information Disclosure Vulnerability")

L2 Linker

I think you guys were searching for the wrong thing.  It was there all along Smiley Happy

OpenSSL TLS Heartbeat Information Disclosure Vulnerability


OpenSSL is prone to a information leak vulnerability while parsing certain crafted SSL requests. The vulnerability is due to the TLS heartbeat extension failing to properly handle SSL request. An attacker could exploit the vulnerability by sending many crafted SSL requests. A successful attack could lead to leak of the server sensitive information.


Me neither.

For good measure, I deleted the existing Threat Definitions and pulled down new ones as I thought perhaps I had originally installed the version that had been pulled by engineering.

Still can't get it to recognize threat hits.

Will this signature/SSL Decoder only work in a situation where the PA is performing decryption?

  • 64 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!